-
361
-
362
Prognostic Value of Postpercutaneous Coronary Intervention Murray-Law-Based Quantitative Flow Ratio
Published 2025-01-01Get full text
Article -
363
-
364
PPARGC1A regulates transcriptional control of mitochondrial biogenesis in early bovine embryos
Published 2025-01-01Get full text
Article -
365
Resistencias discursivas: resignificar, bloquear y desviar
Published 2025-01-01“…Con el fin de evaluar el éxito discursivo de las respuestas a prácticas injustas, identifico tres estrategias contradiscursivas: la resignificación (Butler, 1997), el bloqueo (Langton, 2018) y el desvío (Caponetto y Cepollaro, 2022). …”
Get full text
Article -
366
-
367
-
368
-
369
Project Benefits of Digital Fabrication in Irregular-Shaped Buildings
Published 2019-01-01Get full text
Article -
370
Universal Power Law for Relationship between Rainfall Kinetic Energy and Rainfall Intensity
Published 2016-01-01Get full text
Article -
371
-
372
Analysis of Gene Expression in Human Dermal Fibroblasts Treated with Senescence-Modulating COX Inhibitors
Published 2017-06-01Get full text
Article -
373
EXPLORING THE TEMOKAN TRADITION IN JAVANESE WEDDINGS: AN ANTHROPOLINGUISTIC APPROACH
Published 2024-12-01“…From an anthropolinguistic perspective, the study highlights key performances such as Gantalan Sadak, Wiji Dadi, Wiji Suku, Sindur Binayang, Pangkon Timbang, Tanduring Pengantin, Kacar-Kucur, Dahar Kembul, Martuwi, and Sungkeman. …”
Get full text
Article -
374
-
375
Real-Time 3D Simulation for the Trawl Fishing Gear Based on Parallel Processing of Sonar Sensor Data
Published 2014-07-01Get full text
Article -
376
Obrazy światłem malowane w filmach Dereka Jarmana
Published 2009-03-01“…Autor poszukuje uzasadnienia zarówno w publikacjach operatorów filmowych (Vittorio Storaro), jak i w esejach teoretyków filmu piszących o twórczości Jarmana (William Pencak), a także w publikacjach historyków sztuki wypowiadających się na temat malarstwa Caravaggia, de la Toura i Rembrandta (Walter Friedlaender, Howard Hibbard, Helen Langdon, André Malraux i John Gage). …”
Get full text
Article -
377
Slurs Subordinate by Cueing the Ideology
Published 2021-04-01“… In recent years, a number of authors (e.g., Rae Langton, Mary K. McGowan, and Ishani Maitra) have tried to understand sexist and racist hate speech using John Austin’s speech act theory. …”
Get full text
Article -
378
Kajian pendidikan karakter dimasa pandemi covid-19 studi kasus pada sekolah berasrama
Published 2022-12-01“…Pendidikan karakter di SMA Taruna Nusantara menjadisuatu upaya mewujudkangenerasibangsayangcerdas,santun,tanggap,tanggon,trengginassertamemilikiakhlakmuliayangmerupakancerminkepribadianbangsaIndonesia.KeberhasilanPendidikankarakteryangdijalankanolehSMATarunaNusantaramengisyaratkanbahwapembelajarantidaksertamertadilihat dari perspektif ranah kognitif saja melainkan bagaimana keseimbangan ranah kognitif,afektifdanpsikomotoryangmuaranyaadalahmewujudkanmanusiaseutuhnyadengankarakteryang baik.KondisipandemiCovid-19saatinimenjaditantanganbagiduniapendidikan,khususnya pendidikan formal dalam upaya menerapkan pendidikan karakterbangsa kepadapeserta didik. …”
Get full text
Article -
379
A New Microstructure Development Model for the Evaluation of Concrete Setting Time
Published 2016-01-01Get full text
Article -
380
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article